Document Type : Research Paper

Authors

University of Anbar College of Computer Science and Information Technology Department of Computer Science

Abstract

The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team.  This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology.

Keywords

Main Subjects

1]    Tyagi, A.K., G. Rekha, and N. Sreenath. Beyond the hype: Internet of things concepts, security and privacy concerns. in Advances in Decision Sciences, Image Processing, Security and Computer Vision: International Conference on Emerging Trends in Engineering (ICETE), Vol. 1. 2020. Springer.
[2]   Kalra, S. and S.K. Sood, Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 2015. 24: p. 210-223.
[3]   Zhang, E., et al., Fair hierarchical secret sharing scheme based on smart contract. Information Sciences, 2021. 546: p. 166-176.
[4]   Taha, M.S., et al. Combination of steganography and cryptography: A short survey. in IOP conference series: materials science and engineering. 2019. IOP Publishing.
[5]   Panda, S., S. Mondal, and N. Kumar, SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0. Computers & Electrical Engineering, 2022. 98: p. 107669.
[6]   Sagheer, A.M. and L.H. Abed, Visual secret sharing without pixel expansion. International Journal of Digital Crime and Forensics (IJDCF), 2015. 7(2): p. 20-30.
[7]   AlKhodaidi, T. and A. Gutub, Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications, 2021. 80: p. 1143-1173.
[8]   Weir, J.P., Visual cryptography and its applications2011: Bookboon.
[9]   Shamir, A., How to share a secret. Communications of the ACM, 1979. 22(11): p. 612-613.
[10] Chitra, M.K. and V.P. Venkatesan, An antiquity to the contemporary of secret sharing scheme. Journal of Innovative Image Processing (JIIP), 2020. 2(01): p. 1-13.
[11] Chanu, O.B. and A. Neelima, A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval, 2019. 8(4): p. 195-215.
[12] Gutub, A. and M. Al-Ghamdi, Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 2020. 79(11-12): p. 7951-7985.
[13] Al-Shaarani, F. and A. Gutub, Securing matrix counting-based secret-sharing involving crypto steganography. Journal of King Saud University-Computer and Information Sciences, 2022. 34(9): p. 6909-6924.
[14] Luo, S., et al., Secret Image Sharing Scheme with Lossless Recovery and High Efficiency. Signal Processing, 2023: p. 108931.
[15] Maharjana, S., et al., SCITECH NEPAL.
[16] Ibrahim, D.R., J.S. Teh, and R. Abdullah, An overview of visual cryptography techniques. Multimedia Tools and Applications, 2021. 80: p. 31927-31952.
[17] Bisht, K. and M. Deshmukh, A novel approach for multilevel multi-secret image sharing scheme. The Journal of Supercomputing, 2021. 77(10): p. 12157-12191.
[18] Patil, S.M. and B. Purushothama, Pixel co-ordinate-based secret image sharing scheme with constant size shadow images. Computers & Electrical Engineering, 2021. 89: p. 106937.
[19] Sarosh, P., S.A. Parah, and G.M. Bhat, Utilization of secret sharing technology for secure communication: a state-of-the-art review. Multimedia Tools and Applications, 2021. 80: p. 517-541.
[20] Prasetyo, H. and D. Rosiyadi. Converting (n, n)-multiple secret sharing into more friendly appearance using chinese remainder theorem and boolean operations. in 2021 International Symposium on Electronics and Smart Devices (ISESD). 2021. IEEE.
[21] Naor, M. and A. Shamir. Visual cryptography. in Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9–12, 1994 Proceedings 13. 1995. Springer.
[22] Karolin, M. and D.T. Meyyapan, RGB based secret sharing scheme in color visual cryptography. International Journal of Advanced Research in Computer and Communication Engineering, 2015. 4(7).
[23] Dahat, A.V. and P.V. Chavan, Secret sharing based visual cryptography scheme using CMY color space. Procedia Computer Science, 2016. 78: p. 563-570.
[24] Bharanivendhan, N. and T. Amitha, Visual cryptography schemes for secret image sharing using GAS Algorithm. International Journal of Computer Applications, 2014. 92(8).
[25] Sharma, S., An implementation of a novel secret image sharing algorithm. International Journal of Computer Science and Mobile Computing, 2013. 2(4): p. 263-268.
[26] Kandar, S., A. Maiti, and B.C. Dhara, Visual cryptography scheme for color image using random number with enveloping by digital watermarking. International Journal of Computer Science Issues (IJCSI), 2011. 8(3): p. 543.
[27] Wu, C.-C., M.-S. Hwang, and S.-J. Kao, A new approach to the secret image sharing with steganography and authentication. The Imaging Science Journal, 2009. 57(3): p. 140-151.
[28] Hu, Y.-C., High-capacity image hiding scheme based on vector quantization. Pattern Recognition, 2006. 39(9): p. 1715-1724.
[29] Eslami, Z., S. Razzaghi, and J.Z. Ahmadabadi, Secret image sharing based on cellular automata and steganography. Pattern Recognition, 2010. 43(1): p. 397-404.
[30] Kong, J., et al. A scalable secret image sharing method based on discrete wavelet transform. in Bio-Inspired Computational Intelligence and Applications: International Conference on Life System Modeling and Simulation, LSMS 2007, Shanghai, China, September 14-17, 2007. Proceedings. 2007. Springer.
[31] Rabie, T., M. Baziyad, and I. Kamel, Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools and Applications, 2018. 77: p. 23673-23698.
[32] Hashim, A.T. and L.E. George. Secret image sharing based on wavelet transform. in International Conference on Information Technology in Signal and Image Processing,, Mumbai, India. 2013.
[33] Tresor, L.O. and M. Sumbwanyambe, A selective image encryption scheme based on 2d DWT, Henon map and 4d Qi hyper-chaos. IEEE Access, 2019. 7: p. 103463-103472.
[34] Huang, C.-P. and C.-C. Li, A secret image sharing method using integer wavelet transform. EURASIP Journal on advances in signal processing, 2007. 2007: p. 1-13.
[35] Dharwadkar, N.V. and B. Amberker, Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. International Journal of Signal Processing, 2010. 6(2): p. 93-100.
[36] Surekha, B. and G. Swamy, Visual secret sharing based digital image watermarking. International Journal of Computer Science Issues (IJCSI), 2012. 9(3): p. 312.
[37] Rani, A., et al., A zero-watermarking scheme using discrete wavelet transform. Procedia Computer Science, 2015. 70: p. 603-609.
[38] Tompa, M. and H. Woll, How to share a secret with cheaters. journal of Cryptology, 1989. 1(3): p. 133-138.
[39] Lukac, R. and K.N. Plataniotis, Bit-level based secret sharing for image encryption. Pattern recognition, 2005. 38(5): p. 767-772.
[40] Deshmukh, M., N. Nain, and M. Ahmed, A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. Journal of Visual Communication and Image Representation, 2017. 49: p. 291-302.
[41] Chen, T.-H. and C.-S. Wu, Efficient multi-secret image sharing based on Boolean operations. Signal Processing, 2011. 91(1): p. 90-97.
[42] Rajput, M. and M. Deshmukh, Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Computer Science, 2016. 89: p. 677-683.
[43] Ghodosi, H., J. Pieprzyk, and R. Safavi-Naini. Secret sharing in multilevel and compartmented groups. in Information Security and Privacy: Third Australasian Conference, ACISP’98 Brisbane, Australia, July 13–15, 1998 Proceedings 3. 1998. Springer.
[44] Kumar, P.S., et al., Multi-level secret sharing scheme for mobile ad-hoc networks. International Journal of Advanced Networking and Applications, 2014. 6(2): p. 2253.
[45] Harn, L. and M. Fuyou, Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information processing letters, 2014. 114(9): p. 504-509.
[46] Ersoy, O., K. Kamer, and K. Kaskaloglu, Multilevel threshold secret sharing based on the Chinese remainder theorem. International Journal of Information Security Science, 2019. 8(2): p. 17-29.
[47] Basit, A., et al. Multi-stage multi-secret sharing scheme for hierarchical access structure. in 2017 International Conference on Computing, Communication and Automation (ICCCA). 2017. IEEE.
[48] Chen, D., et al., An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access, 2019. 7: p. 107104-107110.
[49] Hu, F., et al., Threshold Meaningful Secret Image Sharing Scheme Based on QR Code. Security and Communication Networks, 2022. 2022.
[50] Zhang, D. and Z. Gu, A high-quality authenticatable visual secret sharing scheme using SGX. Wireless Communications and Mobile Computing, 2021. 2021: p. 1-12.
[51] Chattopadhyay, A.K., et al., A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools and Applications, 2021. 80: p. 35051-35080.
[52] Kang, Y., et al., Ghost imaging-based optical multilevel authentication scheme using visual cryptography. Optics Communications, 2023. 526: p. 128896.
[53] Lin, C.-C. and W.-H. Tsai, Secret image sharing with steganography and authentication. Journal of Systems and software, 2004. 73(3): p. 405-414.
[54] Aarabi, G., G. Heydecke, and U. Seedorf, Roles of oral infections in the pathomechanism of atherosclerosis. International Journal of Molecular Sciences, 2018. 19(7): p. 1978.
[55] Chang, C.-C., J.-C. Chuang, and P.-Y. Lin. Sharing a secret two-tone image in two gray-level images. in 11th International Conference on Parallel and Distributed Systems (ICPADS'05). 2005. IEEE.